Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Science and Technology Law

Mitigating The Legal Challenges Associated With Blockchain Smart Contracts: The Potential Of Hybrid On-Chain/Off-Chain Contracts, Niloufer Selvadurai Jul 2023

Mitigating The Legal Challenges Associated With Blockchain Smart Contracts: The Potential Of Hybrid On-Chain/Off-Chain Contracts, Niloufer Selvadurai

Washington and Lee Law Review

Tantamount with the increasing application of blockchain technologies around the world, the use of blockchain-based smart contracts has rapidly risen. In a “smart contract,” computer protocols automatically facilitate, verify, and enforce arrangements made between parties on a blockchain. Such smart contracts offer a variety of commercial benefits, notably immutability and increased efficiency facilitated by removing the need for a trusted intermediary. However, as discussed in recent legal scholarship, it is difficult for smart contracts to uphold certain fundamental principles of contract law. Translating concepts of individual intention and responsibility into the decentralized space of blockchain is problematic. Aggregating such individual …


Keynote Address, Sultan Meghji Jul 2023

Keynote Address, Sultan Meghji

Washington and Lee Law Review

Keynote address presented virtually at the Washington and Lee Law Review's 54th Annual Lara D. Gass Symposium: The Future of E-Commerce: Is It on a Blockchain? on Friday, March 17, 2023 in Lexington, Virginia.


How The Blockchain Undermined Digital Ownership, Aaron Perzanowski Jul 2023

How The Blockchain Undermined Digital Ownership, Aaron Perzanowski

Washington and Lee Law Review

The shift from a market built around the sale of tangible goods to one premised on the licensing of digital content and services has done significant and lasting damage to the notion of individual ownership. The emergence of blockchain technology, while certainly not necessary to reverse these trends, promised an opportunity to attract investment and demonstrate consumer demand for marketplaces that recognize meaningful digital ownership. Simultaneously, it offered an avenue for alleviating worries about hypothetical widespread reproduction and unchecked distribution of copyrighted works. Instead, many of the most visible blockchain projects in recent years—the proliferation of new cryptocurrencies and the …


Digital Property Cycles, Joshua Fairfield Jul 2023

Digital Property Cycles, Joshua Fairfield

Washington and Lee Law Review

The present downturn in non-fungible token (“NFT”) markets is no cause for immediate alarm. There have been multiple cycles in both the legal and media focus on digital intangible property, and these cycles will recur. The cycles are easily explainable: demand for intangible property is constant, even increasing. The legal regimes governing ownership of these assets are unstable and poorly suited to satisfying the preferences of buyers and sellers. The combination of demand and poor legal regulation gives rise to the climate of fraud that has come to characterize NFTs, but it has nothing to do with the value of …


Tax Reporting As Regulation Of Digital Financial Markets, Young Ran (Christine) Kim Jul 2023

Tax Reporting As Regulation Of Digital Financial Markets, Young Ran (Christine) Kim

Washington and Lee Law Review

FTX’s recent collapse highlights the overall instability that blockchain assets and digital financial markets face. While the use of blockchain technology and crypto assets is widely prevalent, the associated market is still largely unregulated, and the future of digital asset regulation is also unclear. The lack of clarity and regulation has led to public distrust and has called for more dedicated regulation of digital assets. Among those regulatory efforts, tax policy plays an important role. This Essay introduces comprehensive regulatory frameworks for blockchain-based assets that have been introduced globally and domestically, and it shows that tax reporting is the key …


The Internet, Personal Jurisdiction, And Daos, Matthew R. Mcguire Jul 2023

The Internet, Personal Jurisdiction, And Daos, Matthew R. Mcguire

Washington and Lee Law Review

Global connectivity is at an all-time high, and sovereign state law has not fully caught up with the technological innovations enabling that connectivity. TCP/IP—the communications protocol allowing computers on different networks to speak with each other—wasn’t adopted by ARPANET and the Defense Data Network until January 1983. That’s only forty years ago. And the World Wide Web wasn’t released to the general public until August 1991, less than thirty-five years ago. The first Bitcoin block was mined on January 3, 2009, less than fifteen years ago.

Legal doctrine doesn’t develop that fast, especially in legal systems heavily based around judicial …


Comment: The Necessary Evolution Of State Data Breach Notification Laws: Keeping Pace With New Cyber Threats, Quantum Decryption, And The Rapid Expansion Of Technology, Beth Burgin Waller, Elaine Mccafferty Jan 2022

Comment: The Necessary Evolution Of State Data Breach Notification Laws: Keeping Pace With New Cyber Threats, Quantum Decryption, And The Rapid Expansion Of Technology, Beth Burgin Waller, Elaine Mccafferty

Washington and Lee Law Review

The legal framework that was built almost two decades ago now struggles to keep pace with the rapid expansion of technology, including quantum computing and artificial intelligence, and an ever-evolving cyber threat landscape. In 2002, California passed the first data breach notification law, with all fifty states following suit to require notice of unauthorized access to and acquisition of an individual’s personal information.1 These data breach notification laws, originally designed to capture one-off unauthorized views of data in a computerized database, were not built to address PowerShell scripts by cyber terrorists run across thousands of servers, leaving automated accessed data …


Data Breach Notification Laws And The Quantum Decryption Problem, Phillip Harmon Jan 2022

Data Breach Notification Laws And The Quantum Decryption Problem, Phillip Harmon

Washington and Lee Law Review

In the United States, state data breach notification laws protect citizens by forcing businesses to notify those citizens when their personal information has been compromised. These laws almost universally include an exception for encrypted personal data. Modern encryption methods make encrypted data largely useless, and the notification laws aim to encourage good encryption practices.

This Note challenges the wisdom of laws that place blind faith in the continued infallibility of encryption. For decades, Shor’s algorithm has promised polynomial-time factoring once a sufficiently powerful quantum computer can be built. Competing laboratories around the world steadily continue to march toward this end. …


The Digital Samaritans, Eldar Haber Oct 2020

The Digital Samaritans, Eldar Haber

Washington and Lee Law Review

Bystanderism is becoming largely digital. If being subjected to perilous situations was once reserved almost solely for the physical world, individuals now might witness those in peril digitally from afar via online livestreams. New technological developments in the field of artificial intelligence (AI) might also expand bystanderism to new fields, whereby machines—not just humans—are gradually positioned to better compute their surroundings, thus potentially being capable of reaching a high statistical probability that a perilous situation is currently taking place in their vicinity. This current and future expansion of bystanderism into the digital world forms a rather new type of digital …


Secret Conviction Programs, Meghan J. Ryan Mar 2020

Secret Conviction Programs, Meghan J. Ryan

Washington and Lee Law Review

Judges and juries across the country are convicting criminal defendants based on secret evidence. Although defendants have sought access to the details of this evidence—the results of computer programs and their underlying algorithms and source codes—judges have generally denied their requests. Instead, judges have prioritized the business interests of the for-profit companies that developed these “conviction programs” and which could lose market share if the secret algorithms and source codes on which the programs are based were exposed. This decision has jeopardized criminal defendants’ constitutional rights.


Reinvesting In Rico With Cryptocurrencies: Using Cryptocurrency Networks To Prove Rico’S Enterprise Requirement, Andrew Robert Klimek Mar 2020

Reinvesting In Rico With Cryptocurrencies: Using Cryptocurrency Networks To Prove Rico’S Enterprise Requirement, Andrew Robert Klimek

Washington and Lee Law Review

This Note received the 2019 Roy L. Steinheimer Law Review Award.

This Note argues that the Racketeer Influenced and Corrupt Organizations Act (RICO) may be suited to cryptocurrency prosecutions. RICO subsection 1962(a) addresses the infiltration of an enterprise by investing proceeds from racketeering activities and this Note contends that a cryptocurrency network could serve as the “enterprise” required by the statute. Instead of having to investigate and prove the relationships in an underlying criminal enterprise, proponents of a RICO case against crypto-criminals could rely on well-documented and publicly available information about the cryptocurrency network to prove the enterprise and the …


Text Messages Are Property: Why You Don’T Own Your Text Messages, But It’D Be A Lot Cooler If You Did, Spence M. Howden Jun 2019

Text Messages Are Property: Why You Don’T Own Your Text Messages, But It’D Be A Lot Cooler If You Did, Spence M. Howden

Washington and Lee Law Review

This Note proceeds as follows: Part II offers a brief overview of what text messages are and what they are not. Part III covers the history of intangible personal property law and reviews the evolution of “cybertrespass” claims. Part IV explores the judiciary and the Fourth Amendment’s failure to protect text messages. Finally, Part V evaluates whether text messages constitute property and the practical implications of this finding.